Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:01

General

  • Target

    b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe

  • Size

    672KB

  • MD5

    f1589264d15217a47bf687e3ac998553

  • SHA1

    63f046e3fa0491c2568b09a80b180dfdcce2b2a0

  • SHA256

    b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d

  • SHA512

    48bc541c29d869e5a72a2c4e061bf0976773b1cd1cda33dd8ed609f6b8edbaa9e6f78655e262016dba5947319c567e79188adb78e4fb6fe674cee71ec6249d07

  • SSDEEP

    12288:MMroy903xbBOIoq9kD7JKyaxMPam3V2xVDD/O9m+8Su5mUz3:cyJquJKyaWSmlMKm+hU3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe
    "C:\Users\Admin\AppData\Local\Temp\b8215f08dec82b73252d685c6a95f1cb525ecece88a58cb0d4030ce3e36c5d0d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 1080
          4⤵
          • Program crash
          PID:216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 1136
          4⤵
          • Program crash
          PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3216 -ip 3216
    1⤵
      PID:1332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1476 -ip 1476
      1⤵
        PID:3524

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exe

        Filesize

        175KB

        MD5

        35dddcf57f1b2252b881606d644839de

        SHA1

        c9a5bb72beca91ffd5d2e74fd3d37a217013e81d

        SHA256

        5709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590

        SHA512

        25a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si207450.exe

        Filesize

        175KB

        MD5

        35dddcf57f1b2252b881606d644839de

        SHA1

        c9a5bb72beca91ffd5d2e74fd3d37a217013e81d

        SHA256

        5709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590

        SHA512

        25a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exe

        Filesize

        530KB

        MD5

        953d9c578446d6a0b3871b1155f0c640

        SHA1

        80656e083275df5ef832edc15ce8316d348619d2

        SHA256

        6fd308119f8584a0234f588a69943b626a3bc47b33b71d192b14773f332ccda4

        SHA512

        e3f1adcdcb75fa007e1330b8b0a8aedc0eb3d979de109d1f26f3c6b5fb731b6f8c0384ae412b302d3a898b20a537c255c9fbbb93a9d8a5638fcf314993fc03c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582725.exe

        Filesize

        530KB

        MD5

        953d9c578446d6a0b3871b1155f0c640

        SHA1

        80656e083275df5ef832edc15ce8316d348619d2

        SHA256

        6fd308119f8584a0234f588a69943b626a3bc47b33b71d192b14773f332ccda4

        SHA512

        e3f1adcdcb75fa007e1330b8b0a8aedc0eb3d979de109d1f26f3c6b5fb731b6f8c0384ae412b302d3a898b20a537c255c9fbbb93a9d8a5638fcf314993fc03c6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exe

        Filesize

        259KB

        MD5

        f540e7354b397b499ce46688313fbaf0

        SHA1

        0acddfb282429b205b292fe5a6b0490e9fbeee24

        SHA256

        95b5f4904efb2a2cbd772e008a42be68ae14bee7466abc50efaef620986084b1

        SHA512

        598eeccde030e025551a3a4767fe3d8639c7b4a6d883c2f931fd46ba311fb64f9f8d13acf224558561a87597e4dc7fc3bbcc697b7f6f3fdb07ec0079f54367f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9096.exe

        Filesize

        259KB

        MD5

        f540e7354b397b499ce46688313fbaf0

        SHA1

        0acddfb282429b205b292fe5a6b0490e9fbeee24

        SHA256

        95b5f4904efb2a2cbd772e008a42be68ae14bee7466abc50efaef620986084b1

        SHA512

        598eeccde030e025551a3a4767fe3d8639c7b4a6d883c2f931fd46ba311fb64f9f8d13acf224558561a87597e4dc7fc3bbcc697b7f6f3fdb07ec0079f54367f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exe

        Filesize

        318KB

        MD5

        e678786068b4d45f9d43c2c148c060da

        SHA1

        b298f4e61ee63ad8bd4a7318358d25940ebcbe1c

        SHA256

        358d7c1668e2a7711bea14e17af81b888691faac5ae36776248dc3e96c441de0

        SHA512

        a332bc490017c04cd723f80b250e5da90ff2edd221bb4b777ed9e41fcfe78ca753a3742b6dbfd563aa9b4910033a163afb7edca099a805edc1f327dad681a3ca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8626.exe

        Filesize

        318KB

        MD5

        e678786068b4d45f9d43c2c148c060da

        SHA1

        b298f4e61ee63ad8bd4a7318358d25940ebcbe1c

        SHA256

        358d7c1668e2a7711bea14e17af81b888691faac5ae36776248dc3e96c441de0

        SHA512

        a332bc490017c04cd723f80b250e5da90ff2edd221bb4b777ed9e41fcfe78ca753a3742b6dbfd563aa9b4910033a163afb7edca099a805edc1f327dad681a3ca

      • memory/948-1124-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/948-1123-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/948-1122-0x0000000000670000-0x00000000006A2000-memory.dmp

        Filesize

        200KB

      • memory/1476-1102-0x00000000058C0000-0x00000000059CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1476-1105-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/1476-1116-0x0000000007C50000-0x000000000817C000-memory.dmp

        Filesize

        5.2MB

      • memory/1476-1115-0x0000000007A80000-0x0000000007C42000-memory.dmp

        Filesize

        1.8MB

      • memory/1476-1114-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-1113-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-1112-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-1111-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-1109-0x0000000006620000-0x0000000006670000-memory.dmp

        Filesize

        320KB

      • memory/1476-1108-0x0000000006590000-0x0000000006606000-memory.dmp

        Filesize

        472KB

      • memory/1476-1107-0x00000000064A0000-0x0000000006532000-memory.dmp

        Filesize

        584KB

      • memory/1476-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp

        Filesize

        408KB

      • memory/1476-1104-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/1476-1101-0x0000000005260000-0x0000000005878000-memory.dmp

        Filesize

        6.1MB

      • memory/1476-472-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-474-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-469-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1476-468-0x0000000000630000-0x000000000067B000-memory.dmp

        Filesize

        300KB

      • memory/1476-224-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-191-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-192-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-194-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-196-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-198-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-200-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-202-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-204-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-206-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-208-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-210-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-212-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-214-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-216-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-218-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-220-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/1476-222-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/3216-174-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-183-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-154-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-184-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-172-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-182-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-153-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-170-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-180-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-158-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-178-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-176-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-186-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/3216-156-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-181-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/3216-168-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-166-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-162-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-160-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/3216-152-0x0000000004D10000-0x00000000052B4000-memory.dmp

        Filesize

        5.6MB

      • memory/3216-151-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-150-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-149-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/3216-148-0x0000000000630000-0x000000000065D000-memory.dmp

        Filesize

        180KB